Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html
-
Size
852B
-
MD5
f2d7eeda473657921397b54df6a9bf64
-
SHA1
63a161541f2a72f70ef3a7312803bca24a5cee40
-
SHA256
ac9461b1d6f047cdb2dc7105bb83ebdbeddbffae67bb4aed599f161236e6945b
-
SHA512
0a79c6486a6c9682a024cb0ef19a1a878117baa7197e6c714de55c7eda2fae08b4fadb7d6c7c0835d79c795b00168214853fcdd6800521fb63cddc85ce8b2417
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419409183" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e861098c19b4244d8627ee4664a9606900000000020000000000106600000001000020000000e79bc8b95838c7e9393fb8bd4129c9c5e84636cff74f9353e94f6493a6abdce2000000000e80000000020000200000002816577669c82c96a8828d4f9d8ff5fa272ed0c68898d3378136b952d28c82d8200000005ed4a87f047885e58c41d6add26d6dc2334bb27dc3c6e4aa5fdcb94cfce69681400000006369255167c2aa104590a2e4ed7d5a88f22ba0c5e6f0d1dc5501efac60b31dad6bb803159fa8c0019a839a3d90578ae0ba53852dcbc660584d63abc3392d6a65 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{D3E52EC1-FBB6-11EE-917A-EA263619F6CB} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8063ec96c38fda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2884 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2884 iexplore.exe 2884 iexplore.exe 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE 2340 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2340 2884 iexplore.exe 28 PID 2884 wrote to memory of 2340 2884 iexplore.exe 28 PID 2884 wrote to memory of 2340 2884 iexplore.exe 28 PID 2884 wrote to memory of 2340 2884 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\f2d7eeda473657921397b54df6a9bf64_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2884 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD538f175643ec6b9702484ba14449e371b
SHA14e3f3c618a3040e3a9b3a09f33c18e1afa04bbcf
SHA25699ceccf43f2e753e7958c43b652cf05815b653daa5593f81e54c11bbd7a1d44c
SHA512a4251cb03e8358fd93bb4aa272ffb1fc47d7ca07aae3b7967b82fddb542f65ae61cb004d32d88aa429ca08ac87079e964ca8b924c5e078cf8fa208db8f2585a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b4541bc813f74e495170e1a6dedf5866
SHA1a70c42ce494d21f82e61efb2b95ad6e7b2656d88
SHA2562dd0e8691f778117942033e1f385d90fa00b113a69e68610dee970babefbf064
SHA5121572851bb87eaec8b6e3520a802f0fe05e0ecc68d2543abb2ecef30649f7a8517aae542be2cee35580d687ca013c44f23d68f3240e5ee6a96ccbeffa092ed2d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5814cb5483785b80407d30713a7a0a8f3
SHA11ea4415749f7f838dc8813828a9abf5a7d7ad75a
SHA256c63bf02188ee4bbd8ed78275c55c78d84bbda571d63f17903359bf071a2fc98d
SHA51297fc7c71e350461d784bf7ba33a3f2341f2a1e740f6d698be2f8a74c39914349001a639702bda8c71bae1571644dfe9ed0f20bc4c465bf281642358d3a55aac5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c2704bc2c5b0a2401dd36c03b3c43869
SHA14c7a4b9b0d712582137c4cc8162bc4a808ece00a
SHA2561cb16c12ee8a37c38b4b0014d0e98f124d75f3adfc49a1c859fbdcdb3497fb6d
SHA512e2666f9b95c36a1a86b29d5da9a4dd9e186b82eee14f0888352024076f81f7ce3da0f8955877ad6e961835d2bc0299d0a8780385b1c377192ab7fc34d8efc2b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bab10d78b213c6b9276a4b5ac004d2a
SHA1f13d19668798719cfabdfaab9a354934c7783609
SHA256119fd9d44e9521c7305d1eae538a0f145643d3c2d9d1be8f41d7306e6b15072a
SHA51274b55564fe44594030e3b18b434eaf17c026071b844df0e4c6171525f2f0ee68abc819d2c8f60a633dd7f5b1ac6b0f9555c5598d5102aa3e5b0fb34c9954c819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD577d4e15a9d8d54915ed2d55a83755f0d
SHA109b83a8fb4663e670ec062c54b09eb196e873ec0
SHA2566cad3319b91bc9d0f1c0c0267cc8227be9227c291d21650f8685e8aea840fede
SHA512dd1855dfd56fa874093258259cde799727bdc706c1f49fee41c320a18483067d962d95636631a9aa32abb91aee1c616e003ce85b277e68396dd2ba735932533f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD504d26e955045c64e5f09ffe3bf4acae1
SHA14923404e56d4e419ed5f1cbcb5d0517a620f5579
SHA256aab56236594bb6e0c20c3651c0b076f61e350963b6b2535042bea45178e60aa9
SHA51241bc181471e62245138e13654dac43f1e3e72ed3357d286ed4b8f2bdbc5170e9a1f03d67d7d52b375788a9218d3288e1148a16231cdc2e2425ffa9128f6605f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD510b07ebff3a43cd62e76f42b62183102
SHA18854f1ff7ddec8ba32f4826a750f288939e674bf
SHA25663b90e86b3b26bd21a841eff25390680d652d44de355229fecb5c6a22b649fde
SHA512165335d29e4c0cce8b1c2000fb330f9e0f0b84ee7bebd2d2bbb335ab43b4903de6fc66751a2708e0edeed96d0026897afa043f980bf8bbfdf461ad69444fe0cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5638cad61d49c4e6a8f8b915dd2fbfa39
SHA1cd343bedb7d57c488d9649daeb39f600c699c595
SHA2565d51d35b14fa09ec63f13a8c5f047afd7680b3019dfdffd3bd08ccef41c35c89
SHA512ed89e06eb437343e800d850a58b992b662340dfc7e63436c9f2b1915f0e8497d90c2135b64f27a001861d9c5a46750b9874ee78f14e9bad1374bbfad546bc879
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5892aaf918ac46fa1ebb6d1db86256f04
SHA14e0765ee5ba6816d3975bb2a7e3ed388ede6e4e9
SHA256d30aa655a916eb2c7146d016ff350e06ad01fd67c93a681e63d063edf492b0a3
SHA5129bd6c21e225dbdecf828bc2da2ab9109d1d1e8d8ce4311963fbe8b17fa7412d731f326c01d24bf7d6e97c2a9a43ec38cc12696a577263bda9647d902af41f41b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ae9eeb61a76ec1e71fcd953b9fe2f799
SHA14548799aefbc4fbadd7d846e494dafdea1c403f8
SHA256b800ccba4d5cb69609cbab0f1a766d6fb802c42a1544c6bc8c3915627b069da2
SHA51290e1f8684cd8fbc40e95dddaee5e1654cef7218ef5d9f57b39990ae13812d74aafe17163f4c661a281f93f1e87d096abc5dacea2d5cb85a6f7b7d6f492cddde8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD54344c2d406f2191fbec8b2d8c91184df
SHA13ee87dcb82ae99e796a32a10e99b316ff6cb3010
SHA2569388027fd95538f6e5f06ca94f27034d15a27d10f2287e5697d67e37ece23e6c
SHA512e235513305a079efb4d52cf9e936ef23a40e9de2d849e840f6bf22c6437fd07bc02108f674095e067f81a36282559725c36c04d6dba5d6e3dfae561d81b667b2
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a